Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 00:20

General

  • Target

    670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356.jar

  • Size

    639KB

  • MD5

    03e4a19e7d3a730b13caafbd0e133fb4

  • SHA1

    2e28bb77265f764f6c72bd24833a73e3a26d0383

  • SHA256

    670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356

  • SHA512

    bf3eccb669c2a98b19f5988f859c35df708abaef35b84249b82c8834915089288c6d7d3f0f6a24e5110606f22b99c5dcc1f9523af18099e478c92c2fa5788e4c

  • SSDEEP

    12288:e3LFQp/3X5MD54V94loXgq/nRr+t6eNG57gI9qRE13euc2JcSJzDwa:e3ZQp5M947zXgq5SzG5cGHeuhJfJzDwa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp
      2⤵
      • Views/modifies file attributes
      PID:3504
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp

    Filesize

    639KB

    MD5

    03e4a19e7d3a730b13caafbd0e133fb4

    SHA1

    2e28bb77265f764f6c72bd24833a73e3a26d0383

    SHA256

    670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356

    SHA512

    bf3eccb669c2a98b19f5988f859c35df708abaef35b84249b82c8834915089288c6d7d3f0f6a24e5110606f22b99c5dcc1f9523af18099e478c92c2fa5788e4c

  • memory/3076-34-0x0000018D05790000-0x0000018D05791000-memory.dmp

    Filesize

    4KB

  • memory/3076-19-0x0000018D073F0000-0x0000018D07400000-memory.dmp

    Filesize

    64KB

  • memory/3076-36-0x0000018D07160000-0x0000018D073D0000-memory.dmp

    Filesize

    2.4MB

  • memory/3076-21-0x0000018D07400000-0x0000018D07410000-memory.dmp

    Filesize

    64KB

  • memory/3076-23-0x0000018D07410000-0x0000018D07420000-memory.dmp

    Filesize

    64KB

  • memory/3076-25-0x0000018D07420000-0x0000018D07430000-memory.dmp

    Filesize

    64KB

  • memory/3076-15-0x0000018D073D0000-0x0000018D073E0000-memory.dmp

    Filesize

    64KB

  • memory/3076-29-0x0000018D07430000-0x0000018D07440000-memory.dmp

    Filesize

    64KB

  • memory/3076-37-0x0000018D073D0000-0x0000018D073E0000-memory.dmp

    Filesize

    64KB

  • memory/3076-2-0x0000018D07160000-0x0000018D073D0000-memory.dmp

    Filesize

    2.4MB

  • memory/3076-50-0x0000018D07450000-0x0000018D07460000-memory.dmp

    Filesize

    64KB

  • memory/3076-17-0x0000018D073E0000-0x0000018D073F0000-memory.dmp

    Filesize

    64KB

  • memory/3076-31-0x0000018D07440000-0x0000018D07450000-memory.dmp

    Filesize

    64KB

  • memory/3076-39-0x0000018D073E0000-0x0000018D073F0000-memory.dmp

    Filesize

    64KB

  • memory/3076-40-0x0000018D073F0000-0x0000018D07400000-memory.dmp

    Filesize

    64KB

  • memory/3076-41-0x0000018D07400000-0x0000018D07410000-memory.dmp

    Filesize

    64KB

  • memory/3076-42-0x0000018D07410000-0x0000018D07420000-memory.dmp

    Filesize

    64KB

  • memory/3076-43-0x0000018D07420000-0x0000018D07430000-memory.dmp

    Filesize

    64KB

  • memory/3076-44-0x0000018D07430000-0x0000018D07440000-memory.dmp

    Filesize

    64KB

  • memory/3076-45-0x0000018D07440000-0x0000018D07450000-memory.dmp

    Filesize

    64KB

  • memory/3076-48-0x0000018D07450000-0x0000018D07460000-memory.dmp

    Filesize

    64KB

  • memory/3076-35-0x0000018D05790000-0x0000018D05791000-memory.dmp

    Filesize

    4KB